Farooq Anjum

According to our database1, Farooq Anjum authored at least 36 papers between 1999 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Location dependent key management in sensor networks without using deployment knowledge.
Wirel. Networks, 2010

2007
TRaVarSeL-Transmission Range Variation based Secure Localization.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Guest Editorial Vehicular Networks.
IEEE J. Sel. Areas Commun., 2007

2006
A framework for misuse detection in ad hoc networks- part II.
IEEE J. Sel. Areas Commun., 2006

A framework for misuse detection in ad hoc Networks-part I.
IEEE J. Sel. Areas Commun., 2006

Location dependent key management using random key-predistribution in sensor networks.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

A low-cost robust localization scheme for WLAN.
Proceedings of the 2nd International ICST Conference on Wireless Internet, 2006

Challenges on providing services in a Ubiquitous, Mobile Environment.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

A Statistical Framework for Intrusion Detection in Ad Hoc Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Optimal communication in bluetooth piconets.
IEEE Trans. Veh. Technol., 2005

Client assisted location data acquisition scheme for secure enterprise wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

RIDA: Robust Intrusion Detection in Ad Hoc Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Last hop topology sensitive multicasting key managment.
Proceedings of the Q2SWinet'05, 2005

Secure localization in sensor networks using transmission range variation.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

2004
Efficient Dissemination of Personalized Information Using Content-Based Multicast.
IEEE Trans. Mob. Comput., 2004

Intrusion Tolerance in Distributed Middleware.
Inf. Syst. Frontiers, 2004

TCP Algorithms and Multiple Paths: Considerations for the Future of the Internet.
Inf. Syst. Frontiers, 2004

LiPaD: lightweight packet drop detection for ad hoc networks.
Proceedings of the 60th IEEE Vehicular Technology Conference, 2004

Efficacy of misuse detection in ad hoc networks.
Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004

On Optimal Placement of Intrusion Detection Modules in Sensor Networks.
Proceedings of the 1st International Conference on Broadband Networks (BROADNETS 2004), 2004

2003
Comparative study of various TCP versions over a wireless link with correlated losses.
IEEE/ACM Trans. Netw., 2003

CodeBLUE: a Bluetooth interactive dance club system.
Proceedings of the Global Telecommunications Conference, 2003

Voice performance in WLAN networks - an experimental study.
Proceedings of the Global Telecommunications Conference, 2003

2002
Efficient Dissemination of Personalized Information Using Content-Based Multicast.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

Investigation of intrusion tolerance for COTS middleware.
Proceedings of the IEEE International Conference on Communications, 2002

Improving simultaneous voice and data performance in Bluetooth systems.
Proceedings of the Global Telecommunications Conference, 2002

A robust and adaptive algorithm for enabling efficient communication in Bluetooth networks.
Proceedings of the Global Telecommunications Conference, 2002

2001
CitiTime: a system for rapid creation of portable next-generation telephony services.
Comput. Networks, 2001

2000
Java call control, coordination, and transactions.
IEEE Commun. Mag., 2000

Mobile agents for personalized information retrieval: when are they a good idea?
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Agent based intrusion tolerance using fragmentation-redundancy-scattering technique.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Performance of TCP over lossy upstream and downstream links with link-level retransmissions.
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000

A Comparison of Mobile Agent and Client-Server Paradigms for Information Retrieval Tasks in Virtual Enterprises.
Proceedings of the 2000 Academia / Industry Working Conference on Research Challenges (AIWoRC 2000), 2000

1999
An analytical model for the various TCP algorithms operating over a wireless channel.
Proceedings of the 1999 IEEE Wireless Communications and Networking Conference, 1999

On the Behavior of Different TCP Algorithms over a Wireless Channel With Correlated Packet Losses.
Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1999

Fair Bandwidth Sharing among Adaptive and Non-Adaptive Flows in the Internet.
Proceedings of the Proceedings IEEE INFOCOM '99, 1999


  Loading...